首页 > 最新文献

ICST Transactions on Scalable Information Systems最新文献

英文 中文
Real-Time Monitoring of Data Pipelines: Exploring and Experimentally Proving that the Continuous Monitoring in Data Pipelines Reduces Cost and Elevates Quality 数据管道的实时监控:探索和实验证明数据管道中的持续监控可降低成本并提高质量
Pub Date : 2024-02-07 DOI: 10.4108/eetsis.5065
Shammy Narayanan, Maheswari S, Prisha Zephan
Data pipelines are crucial for processing and transforming data in various domains, including finance, healthcare, and e-commerce. Ensuring the reliability and accuracy of data pipelines is of utmost importance to maintain data integrity and make informed business decisions. In this paper, we explore the significance of continuous monitoring in data pipelines and its contribution to data observability. This work discusses the challenges associated with monitoring data pipelines in real-time, propose a framework for real-time monitoring, and highlight its benefits in enhancing data observability. The findings of this work emphasize the need for organizations to adopt continuous monitoring practices to ensure data quality, detect anomalies, and improve overall system performance.
数据管道对于金融、医疗保健和电子商务等各个领域的数据处理和转换至关重要。确保数据管道的可靠性和准确性对于维护数据完整性和做出明智的业务决策至关重要。在本文中,我们将探讨数据管道中持续监控的意义及其对数据可观测性的贡献。这项工作讨论了与实时监控数据管道相关的挑战,提出了一个实时监控框架,并强调了其在增强数据可观察性方面的优势。这项工作的发现强调了企业采用持续监控实践的必要性,以确保数据质量、检测异常情况并提高整体系统性能。
{"title":"Real-Time Monitoring of Data Pipelines: Exploring and Experimentally Proving that the Continuous Monitoring in Data Pipelines Reduces Cost and Elevates Quality","authors":"Shammy Narayanan, Maheswari S, Prisha Zephan","doi":"10.4108/eetsis.5065","DOIUrl":"https://doi.org/10.4108/eetsis.5065","url":null,"abstract":"Data pipelines are crucial for processing and transforming data in various domains, including finance, healthcare, and e-commerce. Ensuring the reliability and accuracy of data pipelines is of utmost importance to maintain data integrity and make informed business decisions. In this paper, we explore the significance of continuous monitoring in data pipelines and its contribution to data observability. This work discusses the challenges associated with monitoring data pipelines in real-time, propose a framework for real-time monitoring, and highlight its benefits in enhancing data observability. The findings of this work emphasize the need for organizations to adopt continuous monitoring practices to ensure data quality, detect anomalies, and improve overall system performance.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"14 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139797701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Potential of Machine Learning for Immersive Emotion Recognition in Virtual Environment 增强机器学习在虚拟环境中沉浸式情感识别的潜力
Pub Date : 2024-02-05 DOI: 10.4108/eetsis.5036
Abinaya M, V. G
Emotion recognition is an immense challenge for immersive technology. In order to detect the emotions of the user, we use machine learning methods and techniques to use the potential of the Virtual Environment and to improve the user Experience. Emotion recognition plays an important role in developing realistic and emotionally immersive experiences in augmented reality (AR) and virtual reality (VR) settings by instantly adjusting interactions, content, and visuals based on the accurate detection and interpretation of users’ emotions. Immersive systems can enhance user experience through various machine learning algorithms and methods used for emotion recognition, which are examined in this article. Upon novel idea, challenges and potential applications of incorporating emotion recognition in immersive virtual environments with Machine Learning (ML) Techniques and the benefits of tailoring powerful immersive experiences with ML methods were highlighted, and also the study discusses potential advancements in identifying the user’s emotion recognition in the future by modeling an Architecture, as well as how the ML techniques were enhanced for virtual environment is discussed.
情绪识别是沉浸式技术面临的巨大挑战。为了检测用户的情绪,我们使用机器学习方法和技术来发挥虚拟环境的潜力,改善用户体验。情绪识别在增强现实(AR)和虚拟现实(VR)环境中开发逼真和情感沉浸式体验方面发挥着重要作用,它可以根据对用户情绪的准确检测和解读,即时调整交互、内容和视觉效果。沉浸式系统可以通过用于情感识别的各种机器学习算法和方法来增强用户体验,本文将对这些算法和方法进行研究。研究强调了利用机器学习(ML)技术将情感识别纳入沉浸式虚拟环境的新想法、挑战和潜在应用,以及利用 ML 方法定制强大沉浸式体验的好处,还讨论了未来通过架构建模识别用户情感识别的潜在进展,以及如何为虚拟环境增强 ML 技术。
{"title":"Enhancing the Potential of Machine Learning for Immersive Emotion Recognition in Virtual Environment","authors":"Abinaya M, V. G","doi":"10.4108/eetsis.5036","DOIUrl":"https://doi.org/10.4108/eetsis.5036","url":null,"abstract":"Emotion recognition is an immense challenge for immersive technology. In order to detect the emotions of the user, we use machine learning methods and techniques to use the potential of the Virtual Environment and to improve the user Experience. Emotion recognition plays an important role in developing realistic and emotionally immersive experiences in augmented reality (AR) and virtual reality (VR) settings by instantly adjusting interactions, content, and visuals based on the accurate detection and interpretation of users’ emotions. Immersive systems can enhance user experience through various machine learning algorithms and methods used for emotion recognition, which are examined in this article. Upon novel idea, challenges and potential applications of incorporating emotion recognition in immersive virtual environments with Machine Learning (ML) Techniques and the benefits of tailoring powerful immersive experiences with ML methods were highlighted, and also the study discusses potential advancements in identifying the user’s emotion recognition in the future by modeling an Architecture, as well as how the ML techniques were enhanced for virtual environment is discussed.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"13 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139803587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security 利用云数据安全确定针对在线应用程序的入侵攻击
Pub Date : 2024-02-05 DOI: 10.4108/eetsis.5028
Rekha M, Shoba Rani P
Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility, are active in cloud environment layering. Modern technological advancements are made accessible on a daily basis through cloud technology. In the cloud, access control and encryption solutions are more complicated. Because of this greater level, security flaws in online applications and systems are more likely to occur. Somewhere at the ends of the end nodes, a malignant insider can carry out protection assaults. Nevertheless, problems with user privacy and data protection on cloud-based social networking sites continue to exist. Such problems are not known to users. On that social networking site, they post a variety of images, videos, and private information that endures even after eradication. However, some of the data that has been made public was intended to be kept private; as a result, online social information has significantly increased the risk of personally identifiable information leaking. The context of cloud technology depends on the customer capabilities such as quick storing and retrieving offered through cloud computing environments. Dependable cloud providers use a number of methodologies to deliver various digital services, creating a variety of security risks. In this paper, the study of determining intrusive cyber-attacks over the online applications using the cloud data security. Restricting access to shared resources is essential to prevent hackers from stealing vulnerabilities in cloud computing to get unauthorised access to a user's activities as well as information. Gaining access to customer information and obstructing the use of cloud computing are the primary objectives of intrusions on cloud services.
云技术使用户可以随时随地通过任何设备访问信息,这也是造成多种不同类型攻击的主要原因。原则上,数据泄漏、信息泄漏和未经授权的信息访问等多种危险都活跃在云环境分层中。现代技术的进步每天都在通过云技术实现。在云技术中,访问控制和加密解决方案更为复杂。正因为如此,在线应用程序和系统更容易出现安全漏洞。在终端节点的某端,恶性内部人员可以实施保护攻击。尽管如此,云社交网站的用户隐私和数据保护问题依然存在。这些问题并不为用户所知。在该社交网站上,他们会发布各种图片、视频和私人信息,这些信息即使被删除也不会消失。然而,一些被公开的数据原本是要保密的;因此,网络社交信息大大增加了个人身份信息泄露的风险。云技术的背景取决于客户的能力,如通过云计算环境提供的快速存储和检索。可靠的云提供商使用多种方法提供各种数字服务,从而产生了各种安全风险。本文将研究如何利用云数据安全确定对在线应用的入侵性网络攻击。限制对共享资源的访问对于防止黑客利用云计算中的漏洞未经授权访问用户的活动和信息至关重要。获取客户信息和阻碍云计算的使用是入侵云服务的主要目的。
{"title":"Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security","authors":"Rekha M, Shoba Rani P","doi":"10.4108/eetsis.5028","DOIUrl":"https://doi.org/10.4108/eetsis.5028","url":null,"abstract":"Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility, are active in cloud environment layering. Modern technological advancements are made accessible on a daily basis through cloud technology. In the cloud, access control and encryption solutions are more complicated. Because of this greater level, security flaws in online applications and systems are more likely to occur. Somewhere at the ends of the end nodes, a malignant insider can carry out protection assaults. Nevertheless, problems with user privacy and data protection on cloud-based social networking sites continue to exist. Such problems are not known to users. On that social networking site, they post a variety of images, videos, and private information that endures even after eradication. However, some of the data that has been made public was intended to be kept private; as a result, online social information has significantly increased the risk of personally identifiable information leaking. The context of cloud technology depends on the customer capabilities such as quick storing and retrieving offered through cloud computing environments. Dependable cloud providers use a number of methodologies to deliver various digital services, creating a variety of security risks. In this paper, the study of determining intrusive cyber-attacks over the online applications using the cloud data security. Restricting access to shared resources is essential to prevent hackers from stealing vulnerabilities in cloud computing to get unauthorised access to a user's activities as well as information. Gaining access to customer information and obstructing the use of cloud computing are the primary objectives of intrusions on cloud services.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"17 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139862224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Evaluation of Coding and Inter Pixel Redundancy in still Image Compression 静态图像压缩中编码和像素间冗余的经验评估
Pub Date : 2024-02-05 DOI: 10.4108/eetsis.5029
A. S, K. J.
The main aim of this research work is to compress grayscale images efficiently using prediction and intensity-based image compression algorithms. Image compression is useful for removing the duplication in an image to store and transmit the data in an efficient form. This research work analyzes four new schemes for gray scale lossy image compression. Among the four schemes considered, two compressive approaches are designed for Prediction Based Image Compression (PBIC) level implementation. Third approach is designed for Intensity Based Image Compression (IBIC). Finally, the previously designed PBIC and IBIC schemes lead to an Integrated Encoder. All the considered method performances are analyzed using the performance metrics. These results are compared with JPEG 2000 which is a extensively used benchmark compression encoder. The outcome of all the proposed methods is also compared with modern encoders.
这项研究工作的主要目的是利用基于预测和强度的图像压缩算法有效地压缩灰度图像。图像压缩有助于消除图像中的重复,从而以高效的形式存储和传输数据。这项研究工作分析了四种新的灰度有损图像压缩方案。在考虑的四种方案中,有两种压缩方法是为基于预测的图像压缩(PBIC)级实施而设计的。第三种方法是为基于强度的图像压缩(IBIC)设计的。最后,先前设计的 PBIC 和 IBIC 方案产生了一个集成编码器。我们使用性能指标分析了所有考虑到的方法的性能。这些结果与 JPEG 2000 进行了比较,后者是一种广泛使用的基准压缩编码器。所有建议方法的结果也与现代编码器进行了比较。
{"title":"Empirical Evaluation of Coding and Inter Pixel Redundancy in still Image Compression","authors":"A. S, K. J.","doi":"10.4108/eetsis.5029","DOIUrl":"https://doi.org/10.4108/eetsis.5029","url":null,"abstract":"The main aim of this research work is to compress grayscale images efficiently using prediction and intensity-based image compression algorithms. Image compression is useful for removing the duplication in an image to store and transmit the data in an efficient form. This research work analyzes four new schemes for gray scale lossy image compression. Among the four schemes considered, two compressive approaches are designed for Prediction Based Image Compression (PBIC) level implementation. Third approach is designed for Intensity Based Image Compression (IBIC). Finally, the previously designed PBIC and IBIC schemes lead to an Integrated Encoder. All the considered method performances are analyzed using the performance metrics. These results are compared with JPEG 2000 which is a extensively used benchmark compression encoder. The outcome of all the proposed methods is also compared with modern encoders.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"13 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139864736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security 利用云数据安全确定针对在线应用程序的入侵攻击
Pub Date : 2024-02-05 DOI: 10.4108/eetsis.5028
Rekha M, Shoba Rani P
Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility, are active in cloud environment layering. Modern technological advancements are made accessible on a daily basis through cloud technology. In the cloud, access control and encryption solutions are more complicated. Because of this greater level, security flaws in online applications and systems are more likely to occur. Somewhere at the ends of the end nodes, a malignant insider can carry out protection assaults. Nevertheless, problems with user privacy and data protection on cloud-based social networking sites continue to exist. Such problems are not known to users. On that social networking site, they post a variety of images, videos, and private information that endures even after eradication. However, some of the data that has been made public was intended to be kept private; as a result, online social information has significantly increased the risk of personally identifiable information leaking. The context of cloud technology depends on the customer capabilities such as quick storing and retrieving offered through cloud computing environments. Dependable cloud providers use a number of methodologies to deliver various digital services, creating a variety of security risks. In this paper, the study of determining intrusive cyber-attacks over the online applications using the cloud data security. Restricting access to shared resources is essential to prevent hackers from stealing vulnerabilities in cloud computing to get unauthorised access to a user's activities as well as information. Gaining access to customer information and obstructing the use of cloud computing are the primary objectives of intrusions on cloud services.
云技术使用户可以随时随地通过任何设备访问信息,这也是造成多种不同类型攻击的主要原因。原则上,数据泄漏、信息泄漏和未经授权的信息访问等多种危险都活跃在云环境分层中。现代技术的进步每天都在通过云技术实现。在云技术中,访问控制和加密解决方案更为复杂。正因为如此,在线应用程序和系统更容易出现安全漏洞。在终端节点的某端,恶性内部人员可以实施保护攻击。尽管如此,云社交网站的用户隐私和数据保护问题依然存在。这些问题并不为用户所知。在该社交网站上,他们会发布各种图片、视频和私人信息,这些信息即使被删除也不会消失。然而,一些被公开的数据原本是要保密的;因此,网络社交信息大大增加了个人身份信息泄露的风险。云技术的背景取决于客户的能力,如通过云计算环境提供的快速存储和检索。可靠的云提供商使用多种方法提供各种数字服务,从而产生了各种安全风险。本文将研究如何利用云数据安全确定对在线应用的入侵性网络攻击。限制对共享资源的访问对于防止黑客利用云计算中的漏洞未经授权访问用户的活动和信息至关重要。获取客户信息和阻碍云计算的使用是入侵云服务的主要目的。
{"title":"Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security","authors":"Rekha M, Shoba Rani P","doi":"10.4108/eetsis.5028","DOIUrl":"https://doi.org/10.4108/eetsis.5028","url":null,"abstract":"Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility, are active in cloud environment layering. Modern technological advancements are made accessible on a daily basis through cloud technology. In the cloud, access control and encryption solutions are more complicated. Because of this greater level, security flaws in online applications and systems are more likely to occur. Somewhere at the ends of the end nodes, a malignant insider can carry out protection assaults. Nevertheless, problems with user privacy and data protection on cloud-based social networking sites continue to exist. Such problems are not known to users. On that social networking site, they post a variety of images, videos, and private information that endures even after eradication. However, some of the data that has been made public was intended to be kept private; as a result, online social information has significantly increased the risk of personally identifiable information leaking. The context of cloud technology depends on the customer capabilities such as quick storing and retrieving offered through cloud computing environments. Dependable cloud providers use a number of methodologies to deliver various digital services, creating a variety of security risks. In this paper, the study of determining intrusive cyber-attacks over the online applications using the cloud data security. Restricting access to shared resources is essential to prevent hackers from stealing vulnerabilities in cloud computing to get unauthorised access to a user's activities as well as information. Gaining access to customer information and obstructing the use of cloud computing are the primary objectives of intrusions on cloud services.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"50 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139802396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empirical Evaluation of Coding and Inter Pixel Redundancy in still Image Compression 静态图像压缩中编码和像素间冗余的经验评估
Pub Date : 2024-02-05 DOI: 10.4108/eetsis.5029
A. S, K. J.
The main aim of this research work is to compress grayscale images efficiently using prediction and intensity-based image compression algorithms. Image compression is useful for removing the duplication in an image to store and transmit the data in an efficient form. This research work analyzes four new schemes for gray scale lossy image compression. Among the four schemes considered, two compressive approaches are designed for Prediction Based Image Compression (PBIC) level implementation. Third approach is designed for Intensity Based Image Compression (IBIC). Finally, the previously designed PBIC and IBIC schemes lead to an Integrated Encoder. All the considered method performances are analyzed using the performance metrics. These results are compared with JPEG 2000 which is a extensively used benchmark compression encoder. The outcome of all the proposed methods is also compared with modern encoders.
这项研究工作的主要目的是利用基于预测和强度的图像压缩算法有效地压缩灰度图像。图像压缩有助于消除图像中的重复,从而以高效的形式存储和传输数据。这项研究工作分析了四种新的灰度有损图像压缩方案。在考虑的四种方案中,有两种压缩方法是为基于预测的图像压缩(PBIC)级实施而设计的。第三种方法是为基于强度的图像压缩(IBIC)设计的。最后,先前设计的 PBIC 和 IBIC 方案产生了一个集成编码器。我们使用性能指标分析了所有考虑到的方法的性能。这些结果与 JPEG 2000 进行了比较,后者是一种广泛使用的基准压缩编码器。所有建议方法的结果也与现代编码器进行了比较。
{"title":"Empirical Evaluation of Coding and Inter Pixel Redundancy in still Image Compression","authors":"A. S, K. J.","doi":"10.4108/eetsis.5029","DOIUrl":"https://doi.org/10.4108/eetsis.5029","url":null,"abstract":"The main aim of this research work is to compress grayscale images efficiently using prediction and intensity-based image compression algorithms. Image compression is useful for removing the duplication in an image to store and transmit the data in an efficient form. This research work analyzes four new schemes for gray scale lossy image compression. Among the four schemes considered, two compressive approaches are designed for Prediction Based Image Compression (PBIC) level implementation. Third approach is designed for Intensity Based Image Compression (IBIC). Finally, the previously designed PBIC and IBIC schemes lead to an Integrated Encoder. All the considered method performances are analyzed using the performance metrics. These results are compared with JPEG 2000 which is a extensively used benchmark compression encoder. The outcome of all the proposed methods is also compared with modern encoders.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"24 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139805071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Nuclear Reaction Heuristic Intelligence Algorithm for Online Learning in Self-Monitoring Strategy Convergence 改进的核反应启发式智能算法,用于自我监控策略收敛中的在线学习
Pub Date : 2024-02-02 DOI: 10.4108/eetsis.4848
Fengjun Liu, Yang Lu, Bin Xie, Lili Ma
INTRODCTION: By analyzing the problem of self-monitoring in English online learning and constructing a strategy-integrated evaluation method, we can not only enrich the theoretical research results of self-monitoring in online learning, but also improve the independent learning ability and self-monitoring ability of students in English online learning.OBJECTIVES: To address the problem of poor optimization performance of current fusion optimization methods.METHODS:This paper proposes an online learning self-monitoring strategy fusion method based on improved nuclear reaction heuristic intelligent algorithm. First, the problems and enhancement strategies of online learning self-monitoring are analyzed; then, the online learning self-monitoring strategy fusion model is constructed by improving the nuclear reaction heuristic intelligent algorithm; finally, the proposed method is verified to be effective and feasible through the analysis of simulation experiments.RESLUTS: The results show that the fusion method of learning self-monitoring strategies on the line at the 20th iteration number starts to converge to optimization with less than 0.1s optimization time, and the error of the statistical score value before and after weight optimization is controlled within 0.05.CONCLUSION:Addressing the Optimization of Convergence of Self-Monitoring Strategies for English Online Learning.
引言:通过分析英语在线学习中的自我监控问题,构建策略融合评价方法,不仅可以丰富在线学习中自我监控的理论研究成果,还可以提高英语在线学习中学生的自主学习能力和自我监控能力:方法:本文提出了一种基于改进核反应启发式智能算法的在线学习自我监控策略融合方法。首先,分析了在线学习自我监控存在的问题和改进策略;然后,通过改进核反应启发式智能算法,构建了在线学习自我监控策略融合模型;最后,通过仿真实验分析,验证了所提方法的有效性和可行性:结果表明,在线学习自我监控策略融合方法在第20次迭代次数开始收敛优化,优化时间小于0.1s,权重优化前后统计分值误差控制在0.05以内。
{"title":"Improved Nuclear Reaction Heuristic Intelligence Algorithm for Online Learning in Self-Monitoring Strategy Convergence","authors":"Fengjun Liu, Yang Lu, Bin Xie, Lili Ma","doi":"10.4108/eetsis.4848","DOIUrl":"https://doi.org/10.4108/eetsis.4848","url":null,"abstract":"INTRODCTION: By analyzing the problem of self-monitoring in English online learning and constructing a strategy-integrated evaluation method, we can not only enrich the theoretical research results of self-monitoring in online learning, but also improve the independent learning ability and self-monitoring ability of students in English online learning.\u0000OBJECTIVES: To address the problem of poor optimization performance of current fusion optimization methods.METHODS:This paper proposes an online learning self-monitoring strategy fusion method based on improved nuclear reaction heuristic intelligent algorithm. First, the problems and enhancement strategies of online learning self-monitoring are analyzed; then, the online learning self-monitoring strategy fusion model is constructed by improving the nuclear reaction heuristic intelligent algorithm; finally, the proposed method is verified to be effective and feasible through the analysis of simulation experiments.\u0000RESLUTS: The results show that the fusion method of learning self-monitoring strategies on the line at the 20th iteration number starts to converge to optimization with less than 0.1s optimization time, and the error of the statistical score value before and after weight optimization is controlled within 0.05.\u0000CONCLUSION:Addressing the Optimization of Convergence of Self-Monitoring Strategies for English Online Learning.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"67 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139810324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method of Applying Virtual Reality Converged Remote Platform Based on Crawfish Optimization Algorithm to Improve ESN Network 基于小龙虾优化算法的虚拟现实融合远程平台的应用方法,以改善 ESN 网络
Pub Date : 2024-02-02 DOI: 10.4108/eetsis.4844
Lili Ma, Bin Xie, Fengjun Liu, Liying Ma
INTRODCTION: Immersive teaching and learning methods based on virtual reality-integrated remote platforms not only allow foreign language learners to learn in a vivid and intuitive learning environment, but also provide good conditions for multi-channel perceptual experiences of foreign language learners in terms of sight, sound and touch.OBJECTIVES: To address the problems of insufficiently systematic analysis and quantification, poor robustness and low accuracy of analysis methods in current effect analysis methods.METHODS: This paper proposes an effect analysis method of virtual reality fusion remote platform based on crawfish optimization algorithm to improve echo state network. First, the effect analysis system is constructed by analyzing the process of virtual reality fusion remote platform and extracting the effect analysis influencing elements; then, the echo state network is improved by the crayfish optimization algorithm and the effect analysis model is constructed; finally, the high accuracy of the proposed method is verified by the analysis of simulation experiments.RESLUTS: The proposed method improves the accuracy of the virtual reality fusion remote platform effect analysis model, the analysis time is 0.002s, which meets the real-time requirements, and the number of optimization convergence iterations is 16, which is better than other algorithms.CONCLUSION: The problems of insufficiently systematic analytical quantification of effect analysis methods, poor robustness of analytical methods, and low accuracy have been solved.
引言:基于虚拟现实融合远程平台的沉浸式教学方法不仅可以让外语学习者在生动直观的学习环境中学习,而且为外语学习者在视觉、听觉、触觉等方面的多通道感知体验提供了良好的条件:针对目前效果分析方法中存在的分析量化不够系统、鲁棒性差、分析方法准确性低等问题。方法:本文提出了一种基于小龙虾优化算法的虚拟现实融合远程平台效果分析方法,以完善回声状态网络。首先,通过分析虚拟现实融合远程平台的流程,提取效果分析影响要素,构建效果分析体系;然后,通过小龙虾优化算法改进回声状态网络,构建效果分析模型;最后,通过仿真实验分析,验证了所提方法的高准确性:结果:提出的方法提高了虚拟现实融合远程平台效应分析模型的准确性,分析时间为0.002s,满足实时性要求,优化收敛迭代次数为16次,优于其他算法。结论:解决了效应分析方法分析量化不够系统、分析方法鲁棒性差、准确性不高等问题。
{"title":"A Method of Applying Virtual Reality Converged Remote Platform Based on Crawfish Optimization Algorithm to Improve ESN Network","authors":"Lili Ma, Bin Xie, Fengjun Liu, Liying Ma","doi":"10.4108/eetsis.4844","DOIUrl":"https://doi.org/10.4108/eetsis.4844","url":null,"abstract":"INTRODCTION: Immersive teaching and learning methods based on virtual reality-integrated remote platforms not only allow foreign language learners to learn in a vivid and intuitive learning environment, but also provide good conditions for multi-channel perceptual experiences of foreign language learners in terms of sight, sound and touch.OBJECTIVES: To address the problems of insufficiently systematic analysis and quantification, poor robustness and low accuracy of analysis methods in current effect analysis methods.METHODS: This paper proposes an effect analysis method of virtual reality fusion remote platform based on crawfish optimization algorithm to improve echo state network. First, the effect analysis system is constructed by analyzing the process of virtual reality fusion remote platform and extracting the effect analysis influencing elements; then, the echo state network is improved by the crayfish optimization algorithm and the effect analysis model is constructed; finally, the high accuracy of the proposed method is verified by the analysis of simulation experiments.RESLUTS: The proposed method improves the accuracy of the virtual reality fusion remote platform effect analysis model, the analysis time is 0.002s, which meets the real-time requirements, and the number of optimization convergence iterations is 16, which is better than other algorithms.CONCLUSION: The problems of insufficiently systematic analytical quantification of effect analysis methods, poor robustness of analytical methods, and low accuracy have been solved.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"136 34","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139810455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Employee Performance Management Method Based on Big Data Improvement GWO-DELM Algorithms 基于大数据改进 GWO-DELM 算法的员工绩效管理方法研究
Pub Date : 2024-02-02 DOI: 10.4108/eetsis.4916
Zhuyu Wang, Yue Liu
INTRODUCTION: Accurate and objective human resources performance management evaluation methods are conducive to a comprehensive understanding of the real and objective situation of teachers, and are conducive to identifying the management, teaching and academic level of teachers, which enables teacher managers to have a clear understanding of the gaps and problems among teachers.OBJECTIVES: Aiming at the current human resources performance management evaluation method, there are evaluation indexes exist objectivity is not strong, poor precision, single method and other problems.METHODS: This research puts forward an intelligent optimisation algorithm based on the improvement of the depth of the limit of the learning machine network of human resources performance management evaluation method. (1) Through the analysis of the problems existing in the current human resources performance management, select the human resources performance management evaluation indexes, and construct the human resources performance management evaluation system; (2) Through the multi-strategy grey wolf optimization algorithm method to improve the deep learning network, and construct the evaluation model of the human resources performance management in colleges; (3) The analysis of simulation experiments verifies the high precision and real-time nature of the proposed method.RESULTS: The results show that the proposed method improves the precision of the evaluation model, improves the prediction time.CONCLUSION: This research solves the problems of low precision and non-objective system indicators of human resource performance management evaluation.
引言:准确客观的人力资源绩效管理评价方法,有利于全面了解教师的真实客观情况,有利于发现教师的管理水平、教学水平和学术水平,使教师管理者对教师中存在的差距和问题有清晰的认识:针对目前人力资源绩效管理评价方法中,存在评价指标存在客观性不强、精度差、方法单一等问题.方法:本研究提出了一种基于智能优化算法的提高学习机网络深度极限的人力资源绩效管理评价方法.(1)通过分析当前人力资源绩效管理中存在的问题,选取人力资源绩效管理评价指标,构建人力资源绩效管理评价体系;(2)通过多策略灰狼优化算法方法改进深度学习网络,构建高校人力资源绩效管理评价模型;(3)通过仿真实验分析验证了所提方法的高精度和实时性。结果:结果表明,所提方法提高了评价模型的精度,改善了预测时间。结论:本研究解决了人力资源绩效管理评价精度低、系统指标非客观等问题。
{"title":"Research on Employee Performance Management Method Based on Big Data Improvement GWO-DELM Algorithms","authors":"Zhuyu Wang, Yue Liu","doi":"10.4108/eetsis.4916","DOIUrl":"https://doi.org/10.4108/eetsis.4916","url":null,"abstract":"INTRODUCTION: Accurate and objective human resources performance management evaluation methods are conducive to a comprehensive understanding of the real and objective situation of teachers, and are conducive to identifying the management, teaching and academic level of teachers, which enables teacher managers to have a clear understanding of the gaps and problems among teachers.\u0000OBJECTIVES: Aiming at the current human resources performance management evaluation method, there are evaluation indexes exist objectivity is not strong, poor precision, single method and other problems.\u0000METHODS: This research puts forward an intelligent optimisation algorithm based on the improvement of the depth of the limit of the learning machine network of human resources performance management evaluation method. (1) Through the analysis of the problems existing in the current human resources performance management, select the human resources performance management evaluation indexes, and construct the human resources performance management evaluation system; (2) Through the multi-strategy grey wolf optimization algorithm method to improve the deep learning network, and construct the evaluation model of the human resources performance management in colleges; (3) The analysis of simulation experiments verifies the high precision and real-time nature of the proposed method.\u0000RESULTS: The results show that the proposed method improves the precision of the evaluation model, improves the prediction time.\u0000CONCLUSION: This research solves the problems of low precision and non-objective system indicators of human resource performance management evaluation.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"78 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139810874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Use of Deep Confidence Network Based on Crayfish Optimization Algorithm in Automatic Assessment Method of Hearing Effectiveness 基于小龙虾优化算法的深度置信网络在听力效果自动评估方法中的设计与应用
Pub Date : 2024-02-02 DOI: 10.4108/eetsis.4847
Ying Cheng
INTRODCTION: Listening strategy analysis and assessment not only need objective and fair sound listening strategy analysis, but also need high-precision and high real-time assessment model, and even more need in-depth analysis and feature extraction of the influencing factors of listening assessment.OBJECTIVES: To address the problems of current automatic assessment methods, such as non-specific application, poor generalization, low assessment accuracy, and poor real-time performance.METHODS: This paper proposes an automatic assessment method based on a deep confidence network based on crawfish optimization algorithm. First, the multi-dimensional listening strategy evaluation system is constructed by analyzing the listening improvement strategy; then, the depth confidence network is improved by the crayfish optimization algorithm to construct the automatic evaluation model; finally, through the analysis of simulation experiments.RESLUTS: The proposed method improves the evaluation accuracy, robustness, and real-time performance. The absolute value of the relative error of the automatic evaluation value of the proposed method is controlled in the range of 0.011, and the evaluation time is less than 0.005 s. The method is based on a deep confidence network based on the crayfish optimization algorithm.CONCLUSION: The problems of non-specific application of automated assessment methods, poor generalization, low assessment accuracy, and poor real-time performance are addressed. 
引言:听力策略分析与评估不仅需要客观公正的听力策略分析,还需要高精度、高实时性的评估模型,更需要对听力评估的影响因素进行深入分析和特征提取:方法:本文提出了一种基于小龙虾优化算法的深度置信网络自动评测方法。首先,通过分析听力改进策略,构建多维听力策略评估体系;然后,通过小龙虾优化算法改进深度置信网络,构建自动评估模型;最后,通过仿真实验分析:结果:所提出的方法提高了评估的准确性、鲁棒性和实时性。该方法基于小龙虾优化算法的深度置信网络,自动评测值相对误差的绝对值控制在0.011范围内,评测时间小于0.005 s。结论:解决了自动评测方法应用不具体、普适性差、评测精度低、实时性差等问题。
{"title":"Design and Use of Deep Confidence Network Based on Crayfish Optimization Algorithm in Automatic Assessment Method of Hearing Effectiveness","authors":"Ying Cheng","doi":"10.4108/eetsis.4847","DOIUrl":"https://doi.org/10.4108/eetsis.4847","url":null,"abstract":"INTRODCTION: Listening strategy analysis and assessment not only need objective and fair sound listening strategy analysis, but also need high-precision and high real-time assessment model, and even more need in-depth analysis and feature extraction of the influencing factors of listening assessment.OBJECTIVES: To address the problems of current automatic assessment methods, such as non-specific application, poor generalization, low assessment accuracy, and poor real-time performance.METHODS: This paper proposes an automatic assessment method based on a deep confidence network based on crawfish optimization algorithm. First, the multi-dimensional listening strategy evaluation system is constructed by analyzing the listening improvement strategy; then, the depth confidence network is improved by the crayfish optimization algorithm to construct the automatic evaluation model; finally, through the analysis of simulation experiments.RESLUTS: The proposed method improves the evaluation accuracy, robustness, and real-time performance. The absolute value of the relative error of the automatic evaluation value of the proposed method is controlled in the range of 0.011, and the evaluation time is less than 0.005 s. The method is based on a deep confidence network based on the crayfish optimization algorithm.CONCLUSION: The problems of non-specific application of automated assessment methods, poor generalization, low assessment accuracy, and poor real-time performance are addressed. ","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"21 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139809078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICST Transactions on Scalable Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1